Sicap

Security Administrator & Engineering Bundle R80

Sicap
En Miguel Hidalgo

$ 102,177
más IVA
*Precio Orientativo
Importe original en USD:
US$ 5,092
¿Quieres hablar con un Asesor sobre este curso?

Información importante

Tipología Capacitación laboral
Nivel Nivel avanzado
Lugar Miguel hidalgo
Horas lectivas 45h
Duración 5 Días
Inicio Fechas a escoger
  • Capacitación laboral
  • Nivel avanzado
  • Miguel hidalgo
  • 45h
  • Duración:
    5 Días
  • Inicio:
    Fechas a escoger
Descripción

Five days course covers everything you need to start up, configure and manage daily operationd of Check Point Security and Management Software Blades Systems on the GAIA operating system.

Instalaciones (1) y fechas
Dónde se imparte y en qué fechas
Inicio Ubicación
Fechas a escoger
Fechas a escoger
Fechas a escoger
Miguel Hidalgo
Bosque de Duraznos 65-601a, Col. Bosque de Las Lomas, 11700, Ciudad de México (Distrito Federal), México
Ver mapa
Inicio Fechas a escoger
Fechas a escoger
Fechas a escoger
Ubicación
Miguel Hidalgo
Bosque de Duraznos 65-601a, Col. Bosque de Las Lomas, 11700, Ciudad de México (Distrito Federal), México
Ver mapa

Preguntas Frecuentes

· ¿Cuáles son los objetivos de este curso?

Los participantes aprenderán a instalar y configurar un Security Gateway, conocerán las Politicas de Seguridad y podrán administrar y monitorear una red segura. Conceptos avanzados del Firewall, Conceptos Avanzados de Alta Disponibilidad, Conceptos Avanzados de Reporte y Auditoria.

· ¿A quién va dirigido?

A personas que administran los productos de Check Point, Administradores de Sistemas, Administradores de Seguridad, quienes se preparan para las certificaciones CCSA y CCSE.

· Requisitos

•Basic knowledge of networking •Windows Server and/or UNIX skills •Internet and TCP/IP experience

· Titulación

Al terminar el curso se les proporciona un diploma con valor curricular.

· ¿Qué diferencia a este curso de los demás?

Somos el único centro autorizado en México para impartir los cursos. Al tomar el curso entenderán los conceptos de alta disponibilidad, conceptos de reporte y auditoria, conceptos avanzados de migración y respaldos.

· ¿Qué pasa después de pedir información?

Se enviará la información por correo y se les llamará para confirmar que hayan recibido la información, es muy importante que proporcionen un número telefónico celular o fijo, esto es para darle seguimiento a la solicitud

Opiniones

5.0
Valoración del curso
100%
Lo recomiendan
5.0
excelente
Valoración del Centro

Reseñas de este curso

J
Juan Hernández
5.0 01/06/2016
Lo mejor: Administrar redes seguras se debe aprender con profesionales como los profesores de este curso.
A mejorar: Nada.
¿Recomendarías este curso?:
¿Te resultó útil esta opinión? (0)
* Reseñas reunidas por Emagister & iAgora

¿Qué aprendes en este curso?

Backup your Security Gateway and Management Server
•Upgrade and troubleshoot a Management Server
•Build test and troubleshoot a clustered Security Gateway
Gateways
Firewall
Seguridad de redes
Seguridad informática
Check Point
Clustering
Informática
Informática avanzada
Ingeniería informática
Unix
Windows

Profesores

Hector Solis
Hector Solis
Gerente de TI

Programa académico

COURSE TOPICS

▪ Course Layout

▪ Prerequisites

▪ Certification Title

▪ Course Chapters and Learning Objectives

▪ Sample Setup for Labs

 Introduction to Check Point Technology

▪ Concept of a Firewall

 Open Systems Interconnect Model

 Transmission Control Protocol/ Internet Protocol Model

▪ Controlling Network Traffic

 Packet Filtering

 Stateful Inspection

 Application Layer Firewall

▪ Network Communication

 Secure Internal Communication

▪ The Check Point Security Management Architecture

 SmartConsole

 Security Management Server

 Security Gateway

▪ The SmartConsole

 Gateways & Servers View

 Security Policies View

 Logs & Monitor View

 Manage & Setting View

▪ SmartConsole Applications

 SmartEvent (Advanced Events and Reports)

 SmartView Monitor ( Tunel & User Monitoring)

 SmartUpdate

 SmartDashboard

▪ Deployment Platforms

 Check Point Appliances

 Open Servers

▪ Deployment Considerations

 Standalone

 Distributed

 Bridge Mode

▪ Introduction to the Gaia Operating System

 Command Line Interface

 WebUI

 Users

 Updates

 Security Policy Management

▪ Introduction to the Security Policy

 Rules

 Objects

 Anti- Spoofing

 The Rule Base

 Global Properties

 Sections

 Publish Policy

▪ Policy Packages

 Policy Types

 Unified Policies

 Shared Policies

 Additional Policy Management Tools

▪ Install Policy

 Install Policy Package

▪ Network Address Translation

 Hide NAT

 Static NAT

▪ Administration

 Permission Profiles

 Sessions

 Data Revisions

 Concurrent Administration

▪ Managing Remote Gateways

▪ Backups

 Performing Backups

 Policy Layers

▪ Policy Layer Concept

 Policy Layers

 Access Control Policy Layers

 Threat Prevention Policy Layers

 Layers and Policy Packages Example

 Best Practices

▪ Managing the Application Control Policy Layer

 Application Control Software Blade

 URL Filtering Software Blade

 Creating an Application Control and URL Filtering Policy

▪ Review Questions

 Check Point Security Solutions and Licensing

 Check Point Software Blade Architecture

 Security Gateway Software Blades

Advanced Threat Prevention Software Blades

 Management Software Blades for Policy Management

 Management Software Blades for Monitoring Analysis

 Management Software Blades for Operations and Workflow

 Endpoint Software Blades

 Software Blade Packages

▪ Licensing Overview

 Components of a Licenses

 Perpetual versus Subscription Blades

 Central and Local Licenses

 License Activation

 Hardware Licenses

▪ SmartUpdate

 SmartUpdate Architecture

 Using SmartUpdate

 Package Repository

▪ Managing Licenses

 Add and Install Licenses

 Attaching and Detaching Licenses

 New Licenses

 View Licenses Properties

 Export a License

 License Status

 Service Contracts

▪ License Reports

 Traffic Visibility

▪ Analyzing Logs

 Collecting Information

 Deploy Logging

 Configure Logging

 SmartConsole Logs View

 Tracking Rules

 Examining Logs

 Predefined Logs Queries

 Query Language Overview

▪ Monitoring Traffic and Conections

 SmartView Monitor and SmartConsole

 Monitoring and Handling Alerts

 Monitoring Suspicious Activity Rules

 Monitoring Gateway Status

 Users View

 System Counters View

 Tunnels View

 Cooperative Enforcement View

 Traffic View

 Basic Concepts of VPN

▪ Introduction to VPN

 IPSec VPN

 VPN Components

▪ VPN Deployments

 SITE-TO-Site VPN Deployments

N Communities

 Meshed VPN Community

 Star VPN Community

 Combination VPN Communities

 Remote Access VPN Community Object

▪ Access Control for VPN Connections

 Allow All Connections

 Allow All Site-to-Site VPN Connections

 Allow Specific VPN Communities

 Site-to-Site Communities- Allow All Encrypted Traffic

▪ Tunnel Management and Monitoring

 Permanent VPN Tunnels

 Tunnel Testing

 Monitoring VPN Tunnels

 Managing User Access

▪ Overview of User Management Components

 User Directory

 Identity Awareness

▪ Managing Users

 SmartConsole and User Database

 LDAP and User Directory

▪ Authenticating Users

 Authentication Schemes

▪ Managing User Access

 Access Roles

 Rule Bse

 Captive Portal for Guest Access

 Working with Cluster XL

▪ Overview of Cluster XL

▪ ClusterXL Deployments

 High Availability Deployment

▪ Failovers

 Performing a Manual Failover

▪ Synchronizing Cluster Connections

 Securing the Sync Interface

 Clock Synchronization

▪ Monitoring a Cluster

 SmartView Monitor

 Administrator Task Implementation

▪ Compliance Software Blade

 Best Practices

 Continuous Compliance Monitoring

▪ CPView

 User Interface

▪ Appendix


Los usuarios que se interesaron por este curso también han mostrado interés por...
Ver más cursos similares